PoC Released for Microsoft Bluetooth RCE
A proof-of-concept (PoC) has been released for a critical Remote Code Execution (RCE) vulnerability in Microsoft’s Bluetooth service...
A proof-of-concept (PoC) has been released for a critical Remote Code Execution (RCE) vulnerability in Microsoft’s Bluetooth service...
A new malware strain disguised as software cracks and commercial tools uses a just-in-time generation tactic to create unique variants for...
A new command execution technique known as GrimResource has emerged, utilizing Microsoft Saved Console (MSC) files and an unpatched...
Group-IB has uncovered the activities of the threat actor known as Boolka, revealing their sophisticated malware operations and web...
A new vulnerability, identified as CVE-2024-29973, has been discovered in Zyxel NAS devices, making them vulnerable to attacks from...
The newly discovered vulnerability CVE-2024-0762, known as "UEFIcanhazbufferoverflow," affects the Phoenix SecureCore UEFI firmware...
Hackers frequently exploit DNS and ICMP tunneling to covertly transmit data and bypass network security measures. These protocols, often...
UNC3886, identified as a suspected Chinese threat actor, employs sophisticated tactics involving open-source rootkits like 'Reptile' and...
ANSSI, France's information security agency, has attributed targeted cyber attacks against French diplomatic entities to state-sponsored actors...
Symantec's recent report details a long-running espionage campaign targeting telecommunications companies in an unspecified Asian...
© 2025 | CyberMaterial | All rights reserved